Land #9413, Expand the number of class names searched when checking for an exploitable JMX server
parent
bb73d2c07e
commit
294a8e0ada
|
@ -193,10 +193,22 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
def discover_endpoint
|
def discover_endpoint
|
||||||
|
rmi_classes_and_interfaces = [
|
||||||
|
'javax.management.remote.rmi.RMIConnectionImpl',
|
||||||
|
'javax.management.remote.rmi.RMIConnectionImpl_Stub',
|
||||||
|
'javax.management.remote.rmi.RMIConnector',
|
||||||
|
'javax.management.remote.rmi.RMIConnectorServer',
|
||||||
|
'javax.management.remote.rmi.RMIIIOPServerImpl',
|
||||||
|
'javax.management.remote.rmi.RMIJRMPServerImpl',
|
||||||
|
'javax.management.remote.rmi.RMIServerImpl',
|
||||||
|
'javax.management.remote.rmi.RMIServerImpl_Stub',
|
||||||
|
'javax.management.remote.rmi.RMIConnection',
|
||||||
|
'javax.management.remote.rmi.RMIServer'
|
||||||
|
]
|
||||||
ref = send_registry_lookup(name: datastore['JMXRMI'])
|
ref = send_registry_lookup(name: datastore['JMXRMI'])
|
||||||
return nil if ref.nil?
|
return nil if ref.nil?
|
||||||
|
|
||||||
unless ref[:object] == 'javax.management.remote.rmi.RMIServerImpl_Stub'
|
unless rmi_classes_and_interfaces.include? ref[:object]
|
||||||
vprint_error("JMXRMI discovery returned unexpected object #{ref[:object]}")
|
vprint_error("JMXRMI discovery returned unexpected object #{ref[:object]}")
|
||||||
return nil
|
return nil
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue